Difference between revisions of "Information Sharing/Disclosure"

From Cybersecurity Wiki
Jump to navigation Jump to search
Line 8: Line 8:
  
 
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
 
Aviram, Amitai and Tor, Avishalom (2004) [[Overcoming Impediments to Information Sharing]]
 
Computing Research Association (2003) [[Four Grand Challenges in Trustworthy Computing]]
 
  
 
Granick, Jennifer Stisa (2005) [[The Price of Restricting Vulnerability Publications]]
 
Granick, Jennifer Stisa (2005) [[The Price of Restricting Vulnerability Publications]]
Line 52: Line 50:
 
|-
 
|-
 
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
 
|Camp, L. Jean||Lewis, Stephen||2004||[[Economics of Information Security]]||Book||High:Economics||N/A
 +
|-
 +
|Computing Research Association||||2003||[[Four Grand Challenges in Trustworthy Computing]]||Independent Reports||None||[http://www.cyber.st.dhs.gov/docs/CRA%20Grand%20Challenges%202003.pdf ''Pdf'']
 
|-
 
|-
 
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']
 
|Department of Homeland Security||||2003||[[The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets]]||Government Report||None||[http://www.dhs.gov/xlibrary/assets/Physical_Strategy.pdf  ''Pdf'']

Revision as of 16:13, 11 August 2010

TOC-> Issues->Information Sharing/Disclosure

Anderson, Ross and Moore, Tyler (2006) The Economics of Information Security

Anderson, Ross, et. al (2008) Security Economics and the Internal Market

Arora et al. (2006) Does Information Security Attack Frequency Increase With Vulnerability Disclosure

Aviram, Amitai and Tor, Avishalom (2004) Overcoming Impediments to Information Sharing

Granick, Jennifer Stisa (2005) The Price of Restricting Vulnerability Publications

Johnson, Vincent R. (2005) Cybersecurity, Identity Theft, and the Limits of Tort Liability

Lernard, Thomas M. and Rubin, Paul H. (2005) An Economic Analysis of Notification Requirements for Data Security Breaches

Lernard, Thomas M. and Rubin, Paul H. (2006) Much Ado About Notification

Moore, Tyler and Clayton, Richard (2007) Examining the Impact of Website Take-down on Phishing

Moore, Tyler and Clayton, Richard (2008) The Consequence of Non-Cooperation in the Fight Against Phishing

Moore, Tyler and Clayton, Richard (2009) The Impact of Incentives on Notice and Take-down

Moore, Tyler, et. al (2009) The Economics of Online Crime

National Cyber Defense Initiative (2009) National Cyber Defense Financial Services Workshop Report

Powell, Benjamin (2005) Is Cybersecurity a Public Good

Romanosky et al. (2008) Do Data Breach Disclosure Laws Reduce Identity Theft

Schwartz, Paul and Janger, Edward (2007) Notification of Data Security Breaches

Swire, Peter P (2004) A Model for When Disclosure Helps Security

Swire, Peter P (2006) A Theory of Disclosure for Security and Competitive Reasons

Telang, Rahul and Wattal, Sunil (2007) Impact of Software Vulnerability Announcements on the Market Value of Software Vendors

Author 1 Author 2 Year Title Source Expertise Full Text
Camp, L. Jean Lewis, Stephen 2004 Economics of Information Security Book High:Economics N/A
Computing Research Association 2003 Four Grand Challenges in Trustworthy Computing Independent Reports None Pdf
Department of Homeland Security 2003 The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets Government Report None Pdf
Grady, Mark F. Parisi, Francesco 2006 The Law and Economics of Cybersecurity Book Low:Economics; Low:Law N/A
Johnson, Eric M. 2008 Managing Information Risk and the Economics of Security Book High:Economics N/A
National Cyber Security Summit Task Force 2004 Information Security Governance Government Report Moderate:Executive Administration Pdf
  • Subcategories: None

Jump to Table of Contents